Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Fortigate user testing an XG85

I looked through the manual (600+ pages, ugh!) and *thought* I had an idea on how to set up my test XG85...

My current Fortigate has the WAN, LAN, and DMZ ports active.

I replicated the settings for the interfaces, even found where DHCP settings were to turn that on for the DMZ (our tech shop network for client systems).

We generally block SMTP out from anything on the LAN other than the mail server by having the mail server SMTP out rule first, then the all to all rule after that with deny.  Other than that, there's no restrictions.  And that SMTP out rule actually is set to use an IP pool so the IP that the internet expects for us to send mail from is *NOT* the default public IP that is used for the normal traffic.  I have another IP pool address used for DMZ out for the same reason, so that an infected machine, even if it gets the IP on a blacklist, is actually blacklisting an IP that's not used by anything else.

I have a bunch of inbound rules for various services - some non standard RDP ports for remote access to a couple systems, normal SSL for my exchange server, SMTP allowed only from my Barracuda that's colocated at an ISP's site, security camera system with a bunch of non standard ports.  These were easy to duplicate on the XG85, and I actually like several things in the UI that I see as improvements over using the Fortigates...


However, when I unplugged the fortigate and set this in its place, the only thing that worked was the default outbound for web  browsing and such from LAN to WAN.  I had no issues.  But the DMZ, while it could ping the DMZ and WAN port IP"s, wasn't allowed traffic out although that had the default allow all rule from DMZ to WAN.


Not a single inbound rule worked.

Clearly I'm missing something that must be blazingly obvious except that I'm coming from sonicwalls, fortigates, and such, and there's something somewhere that I must be utterly missing.


Where can I start trying to troubleshoot this?  My inbound rules followed the guidelines I found online as far as using non http based policies, setting the source, then the WAN info (interface and public IP) for hosted server, then the internal info under "protected application server".

One thing I'm wondering, with the other firewalls i'm used to, when the public static info is like /40, I only have to put the actual default IP that the firewall will be using if nothing else is specified in the interface.  All the other IP addresses are part of policies or VIP setups.  But maybe that isnt' the case here?  Do I have to manually add every IP address to that external interface for rules using those IP's to work?


Thanks for any help.  I'd LOVE to get this tackled, since I like the UI and functionality of monitoring so much more than the fortigates, and my clients will just LOVE the price difference...

John



This thread was automatically locked due to age.
Parents
  • And bizarrely enough, when I pulled it out of production and just plugged it back in my office, and used a PC and a laptop to simulate IP's inside and outside, it worked fine.  Moved it back and replaced the fortigate live again, and everything just worked.

    No idea why nothing other than outbound web browsing was working the first time it was plugged in, but all rules, outbound and inbound, even my IP policies to get the DMZ and the email SMTP traffic going out other IP addresses is working.

    So disregard...  I apparently DIDN'T miss anything the first time.  It just didn't work for some reason.

    Now to find best practices for the threat monitoring on things so I can help secure connections without breaking too much functionality.

Reply
  • And bizarrely enough, when I pulled it out of production and just plugged it back in my office, and used a PC and a laptop to simulate IP's inside and outside, it worked fine.  Moved it back and replaced the fortigate live again, and everything just worked.

    No idea why nothing other than outbound web browsing was working the first time it was plugged in, but all rules, outbound and inbound, even my IP policies to get the DMZ and the email SMTP traffic going out other IP addresses is working.

    So disregard...  I apparently DIDN'T miss anything the first time.  It just didn't work for some reason.

    Now to find best practices for the threat monitoring on things so I can help secure connections without breaking too much functionality.

Children
No Data